An approach for Secured Image Transmission: A High Capacitive and Confidentiality based Image Steganography using Private Stego-Key

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Stego-Image Generator (SIG) - Building Steganography Image Database

Any Universal Steganalysis algorithm developed should be tested with various stego-images to prove its efficiency. This work is aimed to build the stegoimage database which is obtained by implementing various RGB Least Significant Bit Steganographic algorithms. Though there are many stego-images sources available on the internet it lacks in the information such as how many rows has been infecte...

متن کامل

Image Restoration Using A PDE-Based Approach

 Image restoration is an essential preprocessing step for many image analysis applications. In any image restoration techniques, keeping structure of the image unchanged is very important. Such structure in an image often corresponds to the region discontinuities and edges. The techniques based on partial differential equations, such as the heat equations, are receiving considerable attention i...

متن کامل

SECURE DATA TRANSMISSION USING IMAGE STEGANOGRAPHY- A LabVIEW APPROACH

Information hiding technique is a new kind of secret communication technology. The majority of today’s information hiding systems uses multimedia objects like image, audio, video. image Steganography is a technique used to transmit hidden information by modifying an image signal in to imperceptible manner. In this proposed method, secret message in form of image or text is embedded within anoth...

متن کامل

Image Steganography Method to Improve the Stego Image Quality and Security using Reversible Texture Synthesis

Steganography is the profession of concealing a privacy message within a stated medium like image, audio or video. The main issue regarding every steganography technique is the changes that occur in the cover image after the data embedding procedure. We are using the source texture image for embedding privacy message in diversion with the cover image. This technique grants us to de-embedding th...

متن کامل

Image Steganography Technique Using Sudoku Puzzle and Ecc Algorithm for Secured Data Transmission

Nowadays, Data transmission is becoming very important among humans. So there are many modes of data transmission introduced. Some of the modes of data transmission are through copper wires, wireless channels, computer buses, etc. Though there are certain modes of transmission, secured data transmission is an important thing what everyone needs, because everyone wants their data to transmit sec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Turkish Journal of Computer and Mathematics Education (TURCOMAT)

سال: 2021

ISSN: 1309-4653

DOI: 10.17762/turcomat.v12i3.1710